Threat Intelligence

Past Due Invoice, Future Wire Fraud: How a BEC Campaign Passed Every Authentication Check

Written by Audian Paxson | Apr 16, 2026 11:00:00 AM
TL;DR A Business Email Compromise campaign impersonated a known vendor contact using display name spoofing delivered through SendGrid infrastructure. The email passed SPF, DKIM, and DMARC authentication, carried VERP bounce tracking for delivery confirmation, and attempted to redirect an overdue invoice payment to an attacker-controlled domain registered in February 2026. Themis flagged the behavioral anomaly and quarantined the message across three affected mailboxes before any payment action occurred.
Severity: Critical Bec Invoice Fraud MITRE: T1566.001 MITRE: T1534 MITRE: T1036.005

The subject line was three words: "Past due invoice." The sender name matched a known vendor contact. SPF passed. DKIM passed. DMARC passed. And the entire purpose of the email was to reroute a real payment to an attacker-controlled bank account.

In April 2026, IRONSCALES detected a Business Email Compromise (BEC) campaign targeting a mid-size technology services firm. The attack did not rely on malware, credential harvesting links, or even a convincing email body. It relied on one thing: the recipient already expected the invoice.

BEC invoice diversion remains the most expensive category of cybercrime in the United States. The FBI IC3 2024 Annual Report documented $2.9 billion in BEC losses, and payment diversion schemes accounted for the majority. This attack illustrates exactly why.

Three Words, Zero Red Flags

The email arrived from stan@berteloot[.]org with the display name of a vendor contact the recipient had corresponded with before. The subject line ("Past due invoice.") was unremarkable. There were no urgent threats, no countdown timers, no "your account will be suspended" language. Just a routine nudge about an overdue bill.

The body reinforced the pretext with minimal text and a professional tone. The attacker tagged the message with a "BEC Payment Details" classification, a label that suggests familiarity with how internal email systems categorize financial communications.

What the recipient would not have noticed: the Reply-To address pointed to mail@ilyff[.]com, a domain registered in February 2026. If the recipient hit reply, the response would never reach the legitimate vendor. It would land in the attacker's inbox, where the next step would be a politely worded request to update the payment destination to invoice@billingsdepts[.]info.

That is the entire attack. No links to click. No attachments to open. Just a conversation designed to end with a wire transfer to the wrong account.

Why the Gateway Gave It a Green Light

The message was delivered through SendGrid (IP 159[.]183[.]224[.]102), one of the largest transactional email platforms in the world. SendGrid handles authentication on behalf of its customers, which means the SPF record for berteloot[.]org included SendGrid's infrastructure, and the DKIM signature validated correctly against SendGrid's signing keys.

DMARC? Pass. Microsoft's Composite Authentication (compauth)? Pass. The email was, from a protocol standpoint, indistinguishable from a legitimate business communication.

This is the fundamental limitation of authentication-based detection. SPF, DKIM, and DMARC verify that the sending infrastructure is authorized. They do not verify that the person controlling the sending infrastructure has honest intentions. According to the Verizon 2024 Data Breach Investigations Report, pretexting (the social engineering technique behind BEC) has doubled in frequency since 2022, and the median wire transfer loss per incident exceeds $50,000.

See Your Risk: Calculate how many threats your SEG is missing

The Attacker's Delivery Infrastructure

The relay headers reveal a deliberate operational setup. The message originated from SendGrid's outbound pool at 159[.]183[.]224[.]102, passed through standard MX routing, and arrived with clean header chains. The attacker also configured VERP (Variable Envelope Return Path) bounce tracking, encoding recipient-specific data in the return path so that delivery success could be confirmed on a per-mailbox basis.

VERP is a legitimate email operations feature used by marketing platforms and transactional senders. In this context, it served as reconnaissance: the attacker could confirm which of the three targeted mailboxes accepted delivery and which bounced. That intelligence feeds the next campaign.

The Reply-To domain ilyff[.]com and the payment destination domain billingsdepts[.]info share a common pattern. Both were registered recently. Both use generic naming that could plausibly represent a billing department or financial services entity. Neither had any web presence, email history, or DNS records beyond the minimum required for email delivery. The Microsoft Digital Defense Report 2024 highlights that BEC actors increasingly register purpose-built domains that mimic financial terminology, making them harder to flag without behavioral context.

MITRE ATT&CK Mapping

This campaign maps to several MITRE ATT&CK techniques:

  • T1566.001 (Phishing: Spearphishing Attachment/Link): The email itself is the payload, using social engineering rather than technical exploitation.
  • T1534 (Internal Spearphishing): The attack leveraged familiarity with the target's vendor relationships to craft a convincing pretext.
  • T1036.005 (Masquerading: Match Legitimate Name or Location): Display name impersonation matched a known vendor contact.

Indicators of Compromise

TypeIndicatorContext
Sender Emailstan@berteloot[.]orgImpersonated vendor contact
Reply-To Emailmail@ilyff[.]comAttacker-controlled reply capture
Payment Redirectinvoice@billingsdepts[.]infoAttacker payment destination
Sending IP159[.]183[.]224[.]102SendGrid delivery infrastructure
Subject Line"Past due invoice."BEC pretext
Classification Tag"BEC Payment Details"Attacker-applied message tag

The Signal That Authentication Cannot Provide

Three mailboxes received this message. All three were quarantined by Themis, the IRONSCALES Adaptive AI, before any user replied. The detection was not based on authentication results (which all passed) or URL reputation (there were no URLs). It was based on behavioral pattern analysis: the mismatch between the display name and the envelope sender, the recently registered Reply-To domain, and the communication pattern deviation from the legitimate vendor's baseline.

This is the gap that BEC exploits. Authentication tells you whether an email is technically authorized. It tells you nothing about whether the person behind it is who they claim to be. The IBM Cost of a Data Breach 2024 report found that BEC-initiated breaches cost an average of $4.88 million, with the longest mean time to identify of any attack vector at 261 days.

CISA's email authentication guidance recommends DMARC at p=reject for all organizations, but even perfect authentication cannot stop an attacker who controls a legitimately authenticated sending platform. Security teams need behavioral detection that evaluates who is sending, why, and whether the communication pattern matches historical norms. Without that layer, the next "past due invoice" might cost more than the original bill.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.